POPULARITY
Send us a textWe are a little late this week, but with good reason: Paul Breitbarth and Dr. K Royal were attending the IAPP Global Privacy Summit in Washington D.C. and bring you their report from the Opening General Session of the conference. The speakers during this session were professor Lawrence Lessig, Hans Peter Brøndmo and Catie Cuan, each reflecting on 25 years of IAPP and what is next for us privacy professionals. Apparently: it's robots! Powered by TrustArcSeamlessly manage your privacy program, assess risks, and stay up to date on laws across the globe.With TrustArc's Privacy Studio and Governance Suite, you can automate cookie compliance, streamline data subject rights, and centralize your privacy tasks—all while reducing compliance costs. Visit TrustArc.com/serious-privacy.If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
In this episode, the hosts discuss the evolving landscape of cybersecurity, focusing on Hong Kong's new cybersecurity law aimed at safeguarding key facilities. They explore the implications of this law, the global trend towards stricter cybersecurity regulations, and the U.S. perspective on international cybersecurity threats. The conversation highlights the challenges and opportunities presented by these developments, emphasizing the need for businesses to adapt to new compliance requirements and the importance of protecting critical infrastructure. Article: Hong Kong aims to safeguard key facilities with new cybersecurity law https://www.reuters.com/technology/cybersecurity/hong-kong-aims-safeguard-key-facilities-with-new-cybersecurity-law-2025-03-19/?fbclid=IwZXh0bgNhZW0CMTAAAR3ZjCpdxakYGXlMLQTb9cP3bMAMKU7lVrRj2LkiMYG-C4uQcULpQ8ZOFH4_aem_raJRWyvn7lSXlm1GlKYJcA Please LISTEN
From October 6, 2023: The First Amendment protects speech, but what kind? True speech, sure. But what about false or misleading speech? What if it's harmful? After all, you can't yell fire in a crowded theater—or can you?To answer these questions, Alan Rozenshtein, Associate Professor of Law at the University of Minnesota and Senior Editor at Lawfare spoke with Jeff Kosseff, who is an Associate Professor of Cybersecurity Law in the United States Naval Academy's Cyber Science Department and a Contributing Editor at Lawfare. Jeff is releasing his latest book this month, titled "Liar in a Crowded Theater: Freedom of Speech in a World of Misinformation," in which he describes, and defends, the First Amendment's robust protections for false and misleading speech.They spoke about the book, why you sometimes can yell fire in a crowded theater, and how new technology both superchargers misinformation and provides new tools to fight it.To receive ad-free podcasts, become a Lawfare Material Supporter at www.patreon.com/lawfare. You can also support Lawfare by making a one-time donation at https://givebutter.com/lawfare-institute.Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
⬥GUEST⬥Sarah Fluchs, CTO at admeritia | CRA Expert Group at EU Commission | On LinkedIn: https://www.linkedin.com/in/sarah-fluchs/⬥HOST⬥Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine: https://www.itspmagazine.com/sean-martin⬥EPISODE NOTES⬥The European Commission's Cyber Resilience Act (CRA) introduces a regulatory framework designed to improve the security of digital products sold within the European Union. In a recent episode of Redefining CyberSecurity, host Sean Martin spoke with Sarah Fluchs, Chief Technology Officer at admeritia and a member of the CRA expert group at the EU Commission. Fluchs, who has spent her career in industrial control system cybersecurity, offers critical insights into what the CRA means for manufacturers, retailers, and consumers.A Broad Scope: More Than Just Industrial AutomationUnlike previous security regulations that focused on specific sectors, the CRA applies to virtually all digital products. Fluchs emphasizes that if a device is digital and sold in the EU, it likely falls under the CRA's requirements. From smartwatches and baby monitors to firewalls and industrial control systems, the regulation covers a wide array of consumer and business-facing products.The CRA also extends beyond just hardware—software and services required for product functionality (such as cloud-based components) are also in scope. This broad application is part of what makes the regulation so impactful. Manufacturers now face mandatory cybersecurity requirements that will shape product design, development, and post-sale support.What the CRA RequiresThe CRA introduces mandatory cybersecurity standards across the product lifecycle. Manufacturers will need to:Ensure products are free from known, exploitable vulnerabilities at the time of release.Implement security by design, considering cybersecurity from the earliest stages of product development.Provide security patches for the product's defined lifecycle, with a minimum of five years unless justified otherwise.Maintain a vulnerability disclosure process, ensuring consumers and authorities are informed of security risks.Include cybersecurity documentation, requiring manufacturers to provide detailed security instructions to users.Fluchs notes that these requirements align with established security best practices. For businesses already committed to cybersecurity, the CRA should feel like a structured extension of what they are already doing, rather than a disruptive change.Compliance Challenges: No Detailed Checklist YetOne of the biggest concerns among manufacturers is the lack of detailed compliance guidance. While other EU regulations provide extensive technical specifications, the CRA's security requirements span just one and a half pages. This ambiguity is intentional—it allows flexibility across different industries—but it also creates uncertainty.To address this, the EU will introduce harmonized standards to help manufacturers interpret the CRA. However, with tight deadlines, many of these standards may not be ready before enforcement begins. As a result, companies will need to conduct their own cybersecurity risk assessments and demonstrate due diligence in securing their products.The Impact on Critical Infrastructure and Industrial SystemsWhile the CRA is not specifically a critical infrastructure regulation, it has major implications for industrial environments. Operators of critical systems, such as utilities and manufacturing plants, will benefit from stronger security in the components they rely on.Fluchs highlights that many security gaps in industrial environments stem from weak product security. The CRA aims to fix this by ensuring that manufacturers, rather than operators, bear the responsibility for secure-by-design components. This shift could significantly reduce cybersecurity risks for organizations that rely on complex supply chains.A Security Milestone: Holding Manufacturers AccountableThe CRA represents a fundamental shift in cybersecurity responsibility. For the first time, manufacturers, importers, and retailers must guarantee the security of their products or risk being banned from selling in the EU.Fluchs points out that while the burden of compliance is significant, the benefits for consumers and businesses will be substantial. Security-conscious companies may even gain a competitive advantage, as customers start to prioritize products that meet CRA security standards.For those in the industry wondering how strictly the EU will enforce compliance, Fluchs reassures that the goal is not to punish manufacturers for small mistakes. Instead, the EU Commission aims to improve cybersecurity without unnecessary bureaucracy.The Bottom LineThe Cyber Resilience Act is set to reshape cybersecurity expectations for digital products. While manufacturers face new compliance challenges, consumers and businesses will benefit from stronger security measures, better vulnerability management, and increased transparency.Want to learn more? Listen to the full episode of Redefining CyberSecurity with Sean Martin and Sarah Fluchs to hear more insights into the CRA and what it means for the future of cybersecurity.⬥SPONSORS⬥LevelBlue: https://itspm.ag/attcybersecurity-3jdk3ThreatLocker: https://itspm.ag/threatlocker-r974⬥RESOURCES⬥Inspiring Post: https://www.linkedin.com/posts/sarah-fluchs_aaand-its-official-the-cyber-resilience-activity-7250162223493300224-zECA/Adopted CRA text: https://data.consilium.europa.eu/doc/document/PE-100-2023-INIT/en/pdfA list of Sarah's blog posts to get your CRA knowledge up to speed:1️⃣ Introduction to the CRA, the CE marking, and the regulatory ecosystem around it: https://fluchsfriction.medium.com/eu-cyber-resilience-act-9e092fffbd732️⃣ Explanation how the standards ("harmonised European norms, hEN") are defined that will detail the actual cybersecurity requirements in the CRA (2023): https://fluchsfriction.medium.com/what-cybersecurity-standards-will-products-in-the-eu-soon-have-to-meet-590854ba3c8c3️⃣ Overview of the essential requirements outlined in the CRA (2024): https://fluchsfriction.medium.com/what-the-cyber-resilience-act-requires-from-manufacturers-0ee0b917d2094️⃣ Overview of the global product security regulation landscape and how the CRA fits into it (2024): https://fluchsfriction.medium.com/product-security-regulation-in-2024-93ddc6dd89005️⃣ Good-practice example for the "information and instructions to the user," one of the central documentations that need to be written for CRA compliance and the only one that must be provided to the product's users (2024): https://fluchsfriction.medium.com/how-to-be-cra-compliant-and-make-your-critical-infrastructure-clients-happy-441ecd859f52⬥ADDITIONAL INFORMATION⬥✨ More Redefining CyberSecurity:
⬥GUEST⬥Sarah Fluchs, CTO at admeritia | CRA Expert Group at EU Commission | On LinkedIn: https://www.linkedin.com/in/sarah-fluchs/⬥HOST⬥Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine: https://www.itspmagazine.com/sean-martin⬥EPISODE NOTES⬥The European Commission's Cyber Resilience Act (CRA) introduces a regulatory framework designed to improve the security of digital products sold within the European Union. In a recent episode of Redefining CyberSecurity, host Sean Martin spoke with Sarah Fluchs, Chief Technology Officer at admeritia and a member of the CRA expert group at the EU Commission. Fluchs, who has spent her career in industrial control system cybersecurity, offers critical insights into what the CRA means for manufacturers, retailers, and consumers.A Broad Scope: More Than Just Industrial AutomationUnlike previous security regulations that focused on specific sectors, the CRA applies to virtually all digital products. Fluchs emphasizes that if a device is digital and sold in the EU, it likely falls under the CRA's requirements. From smartwatches and baby monitors to firewalls and industrial control systems, the regulation covers a wide array of consumer and business-facing products.The CRA also extends beyond just hardware—software and services required for product functionality (such as cloud-based components) are also in scope. This broad application is part of what makes the regulation so impactful. Manufacturers now face mandatory cybersecurity requirements that will shape product design, development, and post-sale support.What the CRA RequiresThe CRA introduces mandatory cybersecurity standards across the product lifecycle. Manufacturers will need to:Ensure products are free from known, exploitable vulnerabilities at the time of release.Implement security by design, considering cybersecurity from the earliest stages of product development.Provide security patches for the product's defined lifecycle, with a minimum of five years unless justified otherwise.Maintain a vulnerability disclosure process, ensuring consumers and authorities are informed of security risks.Include cybersecurity documentation, requiring manufacturers to provide detailed security instructions to users.Fluchs notes that these requirements align with established security best practices. For businesses already committed to cybersecurity, the CRA should feel like a structured extension of what they are already doing, rather than a disruptive change.Compliance Challenges: No Detailed Checklist YetOne of the biggest concerns among manufacturers is the lack of detailed compliance guidance. While other EU regulations provide extensive technical specifications, the CRA's security requirements span just one and a half pages. This ambiguity is intentional—it allows flexibility across different industries—but it also creates uncertainty.To address this, the EU will introduce harmonized standards to help manufacturers interpret the CRA. However, with tight deadlines, many of these standards may not be ready before enforcement begins. As a result, companies will need to conduct their own cybersecurity risk assessments and demonstrate due diligence in securing their products.The Impact on Critical Infrastructure and Industrial SystemsWhile the CRA is not specifically a critical infrastructure regulation, it has major implications for industrial environments. Operators of critical systems, such as utilities and manufacturing plants, will benefit from stronger security in the components they rely on.Fluchs highlights that many security gaps in industrial environments stem from weak product security. The CRA aims to fix this by ensuring that manufacturers, rather than operators, bear the responsibility for secure-by-design components. This shift could significantly reduce cybersecurity risks for organizations that rely on complex supply chains.A Security Milestone: Holding Manufacturers AccountableThe CRA represents a fundamental shift in cybersecurity responsibility. For the first time, manufacturers, importers, and retailers must guarantee the security of their products or risk being banned from selling in the EU.Fluchs points out that while the burden of compliance is significant, the benefits for consumers and businesses will be substantial. Security-conscious companies may even gain a competitive advantage, as customers start to prioritize products that meet CRA security standards.For those in the industry wondering how strictly the EU will enforce compliance, Fluchs reassures that the goal is not to punish manufacturers for small mistakes. Instead, the EU Commission aims to improve cybersecurity without unnecessary bureaucracy.The Bottom LineThe Cyber Resilience Act is set to reshape cybersecurity expectations for digital products. While manufacturers face new compliance challenges, consumers and businesses will benefit from stronger security measures, better vulnerability management, and increased transparency.Want to learn more? Listen to the full episode of Redefining CyberSecurity with Sean Martin and Sarah Fluchs to hear more insights into the CRA and what it means for the future of cybersecurity.⬥SPONSORS⬥LevelBlue: https://itspm.ag/attcybersecurity-3jdk3ThreatLocker: https://itspm.ag/threatlocker-r974⬥RESOURCES⬥Inspiring Post: https://www.linkedin.com/posts/sarah-fluchs_aaand-its-official-the-cyber-resilience-activity-7250162223493300224-zECA/Adopted CRA text: https://data.consilium.europa.eu/doc/document/PE-100-2023-INIT/en/pdfA list of Sarah's blog posts to get your CRA knowledge up to speed:1️⃣ Introduction to the CRA, the CE marking, and the regulatory ecosystem around it: https://fluchsfriction.medium.com/eu-cyber-resilience-act-9e092fffbd732️⃣ Explanation how the standards ("harmonised European norms, hEN") are defined that will detail the actual cybersecurity requirements in the CRA (2023): https://fluchsfriction.medium.com/what-cybersecurity-standards-will-products-in-the-eu-soon-have-to-meet-590854ba3c8c3️⃣ Overview of the essential requirements outlined in the CRA (2024): https://fluchsfriction.medium.com/what-the-cyber-resilience-act-requires-from-manufacturers-0ee0b917d2094️⃣ Overview of the global product security regulation landscape and how the CRA fits into it (2024): https://fluchsfriction.medium.com/product-security-regulation-in-2024-93ddc6dd89005️⃣ Good-practice example for the "information and instructions to the user," one of the central documentations that need to be written for CRA compliance and the only one that must be provided to the product's users (2024): https://fluchsfriction.medium.com/how-to-be-cra-compliant-and-make-your-critical-infrastructure-clients-happy-441ecd859f52⬥ADDITIONAL INFORMATION⬥✨ More Redefining CyberSecurity:
In the final episode of season two, you'll hear a recording of a Centre for Constitutional Studies Event from the summer of 2024, titled ‘This Ain't Texas, It's Tiktok.' The event features a discussion with Jameel Jaffer, Executive Director of the Knight First Amendment Institute at Columbia University and Emily Laidlaw, Associate Professor Law at the University of Calgary and Canada Research Chair in Cybersecurity Law. With Dax moderating, Jameel and Emily discuss the regulation of big tech platforms and the different law and policy environments between Canada and the United States.
Welcome to chat:CYBR, Cyber Florida's policy discussion platform. In this episode, host James Jacobs and co-host Jordan Deiuliis engage with Carlton Fields attorney Jack Clabby to explore the intricate world of cybersecurity law and policy. They discuss the role of cybersecurity attorneys, the most common types of cyberattacks, the legal implications of data breaches, and […]
Uno dei più autorevoli professionisti in Italia e all'estero in materia di ICT, Privacy & Cybersecurity Law ci racconta la cybersicurezza a danno delle aziende.>> Leggi anche l'articolo: https://tinyurl.com/ye2apvc5>> Scopri tutti i podcast di Altalex: https://bit.ly/2NpEc3w
In this episode, Dax speaks with Emily Laidlaw, Associate Professor of Law at the University of Calgary and Canada Research Chair in Cybersecurity Law. They discuss how social media has changed our public discourse, the legal obligations of social media platforms and how they're regulated, the development of the Online Harms Bill and whether it addresses our policy problems in this area, and the complex balancing of free expression and harm reduction in an online environment, including controversial hate speech prohibitions in Canada.
Buckle up for a journey through the intersection of writing, technology, and law with cybersecurity expert Star Kashman. In this episode we plunge into the digital minefield that modern writers must navigate, exploring everything from copyright conundrums to the AI authorship revolution. It's going to get bumpy! Star Kashman, a legal maverick in the world of cybersecurity, shares her unconventional path into this cutting-edge field, highlights the pressing need for tech-savvy lawmakers, and explains the complex network of copyright issues in the age of artificial intelligence. But don't despair, wordsmiths! The challenges may be daunting, but this episode arms you with the knowledge and strategies to thrive in this brave new world. Star offers practical insights on how writers can adapt, protect their work, and even leverage AI to enhance their craft. Consider this your call to arms. Learn to protect your creative rights, stay ahead of the technological curve, and succeed in an increasingly complex digital landscape. Whether you're a veteran wordsmith or a budding author, bookmark this episode as your essential guide to conquering the wild west of online writing. Links to sources mentioned in this episode: Star's website: https://www.starkashman.com/ Star's article on Google Dorking: https://digitalcommons.law.uw.edu/cgi/viewcontent.cgi?article=1328&context=wjlta Gotham relations: https://www.gothamgr.com/team Basbanes v. Microsoft: https://casetext.com/case/basbanes-v-microsoft-corp Chapters 00:00 Introduction to Cybersecurity Law and Writing 06:05 The Challenges of Technology and Regulation 09:42 Section 230 and Fair Use 13:21 Understanding Copyright Law and AI 16:07 Legal Issues Surrounding AI-Generated Works 23:13 Fair Use and Copyright Protection 24:18 Understanding Fair Use and Permissions 25:32 The Commodity of Data and the Lack of Regulations 26:22 Balancing Innovation and Legal Consequences 27:39 The Consequences of Infringing Upon Name and Likeness 28:14 Addressing the Use of Information and Training Materials 30:57 The Importance of Ethics in Tech Law 36:37 Using AI Tools for Organization and Inspiration 42:32 Protecting Your Writing and Creative Ideas 46:31 Collaborating for Laws that Protect Authors and Journalists
È un attacco senza precedenti quello inferto a Hezbollah nella giornata di ieri. Migliaia di cercapersone in dotazione all'organizzazione islamista sono esplosi provocando morti e centinaia di feriti. Domani ci sarà il discorso del leader Nasrallah. Ne parliamo con Lorenzo Trombetta, corrispondente dell'Ansa a Beirut, Stefano Mele, avvocato, responsabile del dipartimento Cybersecurity Law, e con Luca Trenta, professore di Relazioni internazionali all'Università di Swansea.
Colonel Mills delivers significant experience in Department of Defense (DoD) and Department of Homeland Security (DHS) cybersecurity, technology, and critical infrastructure programs. He has worked extensively in train and equip efforts using Foreign Military Sales (FMS), foreign military financing, ITAR, and international military education and training, and builds public-private defense and technology industrial base partnerships, including helping establish the DoD's Development Innovation Unit (DIU) in Silicon Valley.Prior to joining The SPECTRUM Group (TSG), Colonel Mills served as the Director for Cybersecurity Policy, Strategy, and International Affairs in the Office of the Secretary of Defense. His work included creating and implementing the first DoD and intelligence community (IC) scorecarding initiative, boosting whole-of government cybersecurity and multidomain responses to threat actor and nation hostile actions.Colonel Mills' 33-year U.S. Army and Army Reserves career culminated in his serving as a senior liaison between DHS and DoD for complex homeland security operations. Earlier, he helped establish and advise foreign national military and security forces in Iraq, Afghanistan, Yemen, Bosnia, South Korea, and the Kingdom of Saudi Arabia. His roles spanned joint and inter-agency operations, psychological operations (PSYOP), intelligence activities, special operations, strategic planning, and public affairs.In addition to his work at TSG, Colonel Mills serves as an adjunct assistant professor for the Cybersecurity Law and Policy program at the University of Maryland, Global Campus.Follow Freedom First Network on Pickax: https://pickax.com/freedomfirstnetworkProtect your financial future with precious metals! Use code VANDERSTEEL to download your FREE Gold and Silver Guide from Genesis Gold today and take control of your financial destiny! https://pickaxgold.comElevate your meals with Freedom First Beef… even if you find yourself in the middle of the apocalypse! Use code FFN for 25% off and enjoy high-quality beef whenever you crave it – today or tomorrow! https://freedomfirstbeef.comBe ready for anything life throws your way with The Wellness Company's Medical Emergency Kit. Order today using code FFN for a 10% discount at https://twc.health/ffn.Unleash the spirit of liberty in every cup with Freedom First Coffee's Founders Blend. Order now using code RIGHTNOW and savor the unparalleled taste of freedom in every patriotic sip. https://freedomfirstcoffee.com
Guest: Jim Dempsey, Senior Policy Advisor, Stanford Program on Geopolitics, Technology and Governance [@FSIStanford]; Lecturer, UC Berkeley Law School [@BerkeleyLaw]On LinkedIn | https://www.linkedin.com/in/james-dempsey-8a10a623/____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinHost: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelliView This Show's Sponsors___________________________Episode NotesJoin Sean Martin and Marco Ciappelli for a dynamic discussion with Jim Dempsey as they unearth critical insights into the rapidly evolving field of cybersecurity law. Jim Dempsey, who teaches cybersecurity law at UC California Berkeley Law School and serves as Senior Policy Advisor to the Stanford Program on Geopolitics, Technology, and Governance, shares his extensive knowledge and experience on the subject, providing a wealth of information on the intricacies and developments within this legal domain.Cybersecurity law is a relatively new but increasingly important area of the legal landscape. As Dempsey pointed out, the field is continually evolving, with significant strides made over the past few years in response to the growing complexity and frequency of cyber threats. One key aspect highlighted was the concept of 'reasonable cybersecurity'—a standard that demands organizations implement adequate security measures, not necessarily perfect ones, to protect against breaches and other cyber incidents. This concept parallels other industries where safety standards are continually refined and enforced.The conversation also delved into the historical context of cybersecurity law, referencing the Computer Fraud and Abuse Act of 1986, which initially aimed to combat unauthorized access and exploitation of computer systems. Dempsey provided an enlightening historical perspective on how traditional laws have been adapted to the digital age, emphasizing the role of common law and the evolution of legal principles to meet the challenges posed by technology.One of the pivotal points of discussion was the shift in liability for cybersecurity failures. The Biden administration's National Cybersecurity Strategy of 2023 marks a significant departure from previous policies by advocating for holding software developers accountable for the security of their products, rather than placing the entire burden on end-users. This approach aims to incentivize higher standards of software development and greater accountability within the industry.The discussion also touched on the importance of corporate governance in cybersecurity. With new regulations from bodies like the Securities and Exchange Commission (SEC), companies are now required to disclose material cybersecurity incidents, thus emphasizing the need for collaboration between cybersecurity teams and legal departments to navigate these requirements effectively.Overall, the episode underscored the multifaceted nature of cybersecurity law, implicating not just legal frameworks but also technological standards, corporate policies, and international relations. Dempsey's insights elucidated how cybersecurity law is becoming ever more integral to various aspects of society and governance, marking its transition from a peripheral concern to a central pillar in protecting digital infrastructure and information integrity. This ongoing evolution makes it clear that cybersecurity law will continue to be a critical area of focus for legal professionals, policymakers, and businesses alike.Top Questions AddressedWhat is the importance of defining 'reasonable cybersecurity,' and how is this standard evolving?How has the shift in legal liability for cybersecurity incidents, particularly under the Biden administration, impacted the software industry?In what ways are historical legal principles, like those from the Computer Fraud and Abuse Act, being adapted to meet modern cybersecurity challenges?About the BookFirst published in 2021, Cybersecurity Law Fundamentals has been completely revised and updated.U.S. cybersecurity law is rapidly changing. Since 2021, there have been major Supreme Court decisions interpreting the federal computer crime law and deeply affecting the principles of standing in data breach cases. The Securities and Exchange Commission has adopted new rules for publicly traded companies on cyber incident disclosure. The Federal Trade Commission revised its cybersecurity rules under the Gramm-Leach-Bliley Act and set out new expectations for all businesses collecting personal information. Sector-by-sector, federal regulators have issued binding cybersecurity rules for critical infrastructure, while a majority of states have adopted their own laws requiring reasonable cybersecurity controls. Executive orders have set in motion new requirements for federal contractors.All these changes and many more are addressed in the second edition of Cybersecurity Law Fundamentals, published April, 2024. The second edition is co-authored by John P. Carlin, partner at Paul Weiss and former long-time senior official of the U.S. Justice Department, where he was one of the architects of current U.S. cybersecurity policy.___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
Guest: Jim Dempsey, Senior Policy Advisor, Stanford Program on Geopolitics, Technology and Governance [@FSIStanford]; Lecturer, UC Berkeley Law School [@BerkeleyLaw]On LinkedIn | https://www.linkedin.com/in/james-dempsey-8a10a623/____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinHost: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelliView This Show's Sponsors___________________________Episode NotesJoin Sean Martin and Marco Ciappelli for a dynamic discussion with Jim Dempsey as they unearth critical insights into the rapidly evolving field of cybersecurity law. Jim Dempsey, who teaches cybersecurity law at UC California Berkeley Law School and serves as Senior Policy Advisor to the Stanford Program on Geopolitics, Technology, and Governance, shares his extensive knowledge and experience on the subject, providing a wealth of information on the intricacies and developments within this legal domain.Cybersecurity law is a relatively new but increasingly important area of the legal landscape. As Dempsey pointed out, the field is continually evolving, with significant strides made over the past few years in response to the growing complexity and frequency of cyber threats. One key aspect highlighted was the concept of 'reasonable cybersecurity'—a standard that demands organizations implement adequate security measures, not necessarily perfect ones, to protect against breaches and other cyber incidents. This concept parallels other industries where safety standards are continually refined and enforced.The conversation also delved into the historical context of cybersecurity law, referencing the Computer Fraud and Abuse Act of 1986, which initially aimed to combat unauthorized access and exploitation of computer systems. Dempsey provided an enlightening historical perspective on how traditional laws have been adapted to the digital age, emphasizing the role of common law and the evolution of legal principles to meet the challenges posed by technology.One of the pivotal points of discussion was the shift in liability for cybersecurity failures. The Biden administration's National Cybersecurity Strategy of 2023 marks a significant departure from previous policies by advocating for holding software developers accountable for the security of their products, rather than placing the entire burden on end-users. This approach aims to incentivize higher standards of software development and greater accountability within the industry.The discussion also touched on the importance of corporate governance in cybersecurity. With new regulations from bodies like the Securities and Exchange Commission (SEC), companies are now required to disclose material cybersecurity incidents, thus emphasizing the need for collaboration between cybersecurity teams and legal departments to navigate these requirements effectively.Overall, the episode underscored the multifaceted nature of cybersecurity law, implicating not just legal frameworks but also technological standards, corporate policies, and international relations. Dempsey's insights elucidated how cybersecurity law is becoming ever more integral to various aspects of society and governance, marking its transition from a peripheral concern to a central pillar in protecting digital infrastructure and information integrity. This ongoing evolution makes it clear that cybersecurity law will continue to be a critical area of focus for legal professionals, policymakers, and businesses alike.Top Questions AddressedWhat is the importance of defining 'reasonable cybersecurity,' and how is this standard evolving?How has the shift in legal liability for cybersecurity incidents, particularly under the Biden administration, impacted the software industry?In what ways are historical legal principles, like those from the Computer Fraud and Abuse Act, being adapted to meet modern cybersecurity challenges?About the BookFirst published in 2021, Cybersecurity Law Fundamentals has been completely revised and updated.U.S. cybersecurity law is rapidly changing. Since 2021, there have been major Supreme Court decisions interpreting the federal computer crime law and deeply affecting the principles of standing in data breach cases. The Securities and Exchange Commission has adopted new rules for publicly traded companies on cyber incident disclosure. The Federal Trade Commission revised its cybersecurity rules under the Gramm-Leach-Bliley Act and set out new expectations for all businesses collecting personal information. Sector-by-sector, federal regulators have issued binding cybersecurity rules for critical infrastructure, while a majority of states have adopted their own laws requiring reasonable cybersecurity controls. Executive orders have set in motion new requirements for federal contractors.All these changes and many more are addressed in the second edition of Cybersecurity Law Fundamentals, published April, 2024. The second edition is co-authored by John P. Carlin, partner at Paul Weiss and former long-time senior official of the U.S. Justice Department, where he was one of the architects of current U.S. cybersecurity policy.___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
Chuck Joiner, Dave Ginsburg, Marty Jencius, Jim Rea, Jeff Gamet, and Eric Bolden consider the issue with iPhone alarms not riniging for some users and Apple's response. The panel then looks at the cybersecurity challenges faced by governments using Microsoft products because of the history of security breaches targeting Microsoft systems, and the necessity for enhanced security measures in our technology-driven world. We also discuss the complexities of system updates, the significance of strong password security, and the implications of a new cybersecurity law in the UK. Today's MacVoices is supported by Backblaze. MacVoices listeners get a fully featured no risk free trial at Backblaze.com/macvoices. Go there, play with it, start protecting yourself from potential bad times! Start Today! Show Notes: Chapters: 00:00 Apple Alarm Issues and Cybersecurity Laws 03:32 Sleeping in, Alarms, and Oversleeping Dilemma 04:42 U.S. Government and Microsoft Security Challenges 09:10 Concerns and Responsibility in Cybersecurity 14:00 Challenges with Old Operating Systems 17:08 Challenges with Running Old Operating Systems 24:49 New Cybersecurity Law from the UK 33:16 Societal Impact of Poor Security Practices Links: Is Your iPhone's Alarm Not Playing a Sound? Apple Working on Fix https://www.macrumors.com/2024/04/30/apple-working-on-fix-for-iphone-alarm-issue/ The US Government Has a Microsoft Problem https://www.wired.com/story/the-us-government-has-a-microsoft-problem/ New Cybersecurity Law in UK Forces Apple to Enhance Protections or Face Massive Penalties https://www.mactrast.com/2024/04/new-cybersecurity-law-in-uk-forces-apple-to-enhance-protections-or-face-massive-penalties/ Guests: Eric Bolden is into macOS, plants, sci-fi, food, and is a rural internet supporter. You can connect with him on Twitter, by email at embolden@mac.com, on Mastodon at @eabolden@techhub.social, on his blog, Trending At Work, and as co-host on The Vision ProFiles podcast. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, jeffgamet on LinkedIn., @jgamet@mastodon.social on Mastodon, and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65 and on Mastodon at @daveg65@mastodon.cloud Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession ‘firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He's been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
Chuck Joiner, Dave Ginsburg, Marty Jencius, Jim Rea, Jeff Gamet, and Eric Bolden consider the issue with iPhone alarms not riniging for some users and Apple's response. The panel then looks at the cybersecurity challenges faced by governments using Microsoft products because of the history of security breaches targeting Microsoft systems, and the necessity for enhanced security measures in our technology-driven world. We also discuss the complexities of system updates, the significance of strong password security, and the implications of a new cybersecurity law in the UK. Today's MacVoices is supported by Backblaze. MacVoices listeners get a fully featured no risk free trial at Backblaze.com/macvoices. Go there, play with it, start protecting yourself from potential bad times! Start Today! Show Notes: Chapters: 00:00 Apple Alarm Issues and Cybersecurity Laws 03:32 Sleeping in, Alarms, and Oversleeping Dilemma 04:42 U.S. Government and Microsoft Security Challenges 09:10 Concerns and Responsibility in Cybersecurity 14:00 Challenges with Old Operating Systems 17:08 Challenges with Running Old Operating Systems 24:49 New Cybersecurity Law from the UK 33:16 Societal Impact of Poor Security Practices Links: Is Your iPhone's Alarm Not Playing a Sound? Apple Working on Fix https://www.macrumors.com/2024/04/30/apple-working-on-fix-for-iphone-alarm-issue/ The US Government Has a Microsoft Problem https://www.wired.com/story/the-us-government-has-a-microsoft-problem/ New Cybersecurity Law in UK Forces Apple to Enhance Protections or Face Massive Penalties https://www.mactrast.com/2024/04/new-cybersecurity-law-in-uk-forces-apple-to-enhance-protections-or-face-massive-penalties/ Guests: Eric Bolden is into macOS, plants, sci-fi, food, and is a rural internet supporter. You can connect with him on Twitter, by email at embolden@mac.com, on Mastodon at @eabolden@techhub.social, on his blog, Trending At Work, and as co-host on The Vision ProFiles podcast. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, jeffgamet on LinkedIn., @jgamet@mastodon.social on Mastodon, and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65 and on Mastodon at @daveg65@mastodon.cloud Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession ‘firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He's been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
Where do we stand in the face of rapid AI advancements, and are lawmakers ready to tackle the transformative impact of AI on our legal systems? Join us for a discussion led by our very special guest Dr. Pavan Duggal, an esteemed advocate at Supreme Court of India. With his pioneering work in cybersecurity and privacy, Dr Duggal has been a guiding force in India's discourse on these critical issues long before they became commonplace. Specializing in Cyberlaw, Cybercrime Law, Cybersecurity Law, and Artificial Intelligence Law, Dr. Duggal brings unparalleled expertise to the table. From the blurred lines between AI-enabled crimes to the challenges of safeguarding personal data online, our hosts Leslie, Deepti and Shouvik will explore the complexities of AI regulation and find out how legal frameworks are adapting to address the ethical and legal implications of AI advancements. Gain a deeper understanding of the opportunities and challenges that lie ahead as we navigate the intersection of law and AI. Dr Duggal shares invaluable insights into protecting ourselves and our data in the digital age.
There is a lot to keep up with in U.S. cybersecurity law and policy these days. To talk about the current regulatory landscape and the progression of the DOJ's strategy relating to takedown and disruption efforts, Lawfare Senior Editor Stephanie Pell sat down with Jim Dempsey, Senior Policy Advisor at the Stanford Program on Geopolitics, Technology, and Governance, and John Carlin, Partner at Paul Weiss. They talked about the SEC's cyber disclosure rule, the new executive order focused on preventing access to Americans' bulk sensitive personal data, the LockBit and Volt Typhoon disruption efforts, and more. To receive ad-free podcasts, become a Lawfare Material Supporter at www.patreon.com/lawfare. You can also support Lawfare by making a one-time donation at https://givebutter.com/c/trumptrials.Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
In honor of Women's History Month, please enjoy this episode of the Palo Alto Networks Unit 42's Threat Vector podcast featuring host David Moulton's discussion with Jacqueline Wudyka about the SEC's Cybersecurity Law. In this episode, join host David Moulton as he speaks with Stephanie Regan, a senior consultant at Unit 42. Stephanie, with a background in law enforcement, specializes in compromise assessment and incident response. Discover her insights into combating the Muddled Libra threat group and similar adversaries. Stephanie highlights the crucial role of reconnaissance in investigations and the importance of strong multi-factor authentication (MFA) to counter phishing and social engineering attacks. She delves into techniques like domain typo squatting and shares how domain monitoring can thwart attackers. Learn how Unit 42 assists clients in recovering from attacks, especially those by Muddled Libra. Stephanie emphasizes rapid response and coordination, including using out-of-band communications to outmaneuver threat actors. You can learn more about Muddled Libra at https://unit42.paloaltonetworks.com/muddled-libra/ where Kristopher was the lead author for the Threat Group Assessment: Muddled Libra. Join the conversation on our social media channels: Website: https://www.paloaltonetworks.com/unit42 Threat Research: https://unit42.paloaltonetworks.com/ Facebook: https://www.facebook.com/LifeatPaloAltoNetworks/ LinkedIn: https://www.linkedin.com/company/unit42/ YouTube: @PaloAltoNetworksUnit42 Twitter: https://twitter.com/PaloAltoNtwks About Threat Vector Unit 42 Threat Vector is the compass in the world of cyberthreats. Hear about Unit 42's unique threat intelligence insights, new threat actor TTPs, real-world case studies, and learn how the team works together to discover these threats. Unit 42 will equip listeners with the knowledge and insight to proactively prepare and stay ahead in the ever-evolving threat landscape. PALO ALTO NETWORKS Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. http://paloaltonetworks.com
In honor of Women's History Month, please enjoy this episode of the Palo Alto Networks Unit 42's Threat Vector podcast featuring host David Moulton's discussion with Jacqueline Wudyka about the SEC's Cybersecurity Law. In this episode of Threat Vector, we dive deep into the new SEC cybersecurity regulations that reshape how public companies handle cyber risks. Legal expert and Unit 42 Consultant Jacqueline Wudyka brings a unique perspective on the challenges of defining 'materiality,' the enforcement hurdles, and the impact on the cybersecurity landscape. Whether you're a cybersecurity professional, legal expert, or just keen on understanding the latest in cyber law, this episode is packed with insights and strategies for navigating this new terrain. Tune in to stay ahead in the world of cybersecurity compliance! If you're interested to learn more about Unit 42's world-class visit https://www.paloaltonetworks.com/unit42 Join the conversation on our social media channels: Website: https://www.paloaltonetworks.com/unit42 Threat Research: https://unit42.paloaltonetworks.com/ Facebook: https://www.facebook.com/LifeatPaloAltoNetworks/ LinkedIn: https://www.linkedin.com/company/unit42/ YouTube: @PaloAltoNetworksUnit42 Twitter: https://twitter.com/PaloAltoNtwks Learn more about your ad choices. Visit megaphone.fm/adchoices
On today's show Andrew and Bill begin with the Ministry of State Security providing its interpretation of the Cybersecurity Law. Topics include: The odd timing of this message as debate roils over TikTok, the legal and regulatory framework that's emerged under Xi, and the lack of anonymity on the PRC internet. From there: The Hong Kong legislature passes Article 23 faster than expected, and an update on the state of the TikTok legislation as the Senate prepares for an intel briefing on Wednesday. Then: Lessons from the solar industry as domestic suppliers in the EU and US struggle to compete with the PRC, Liu Jianchao offers clarifying commentary on China's approach to the Global South, Rahm Emanuel talks to Semafor, and Zach Edey takes center stage in the NCAA Tournament.
Richard Warman used to take neo-nazis he found online to the human rights commission. He used an obscure provision called Section 13, which was repealed in 2014. But it may be coming back.The long-awaited Online Harms Act includes a section allowing users to sue each other for hate speech online. Free speech advocates are worried, but some say it's time trolls start behaving. Who gets to decide what's hate speech? Is this the end of online hate or the start of something more sinister? To find out, Mattea Roach asked Emily Laidlaw, a Canada Research Chair in Cybersecurity Law and an Associate Professor at the University of Calgary, and Richard Moon, a law professor at the University of Windsor. Host: Mattea RoachCredits: Aviva Lessard (Producer), Sam Konnert (Producer), Caleb Thompson (Audio Editor and Technical Producer), André Proulx (Production Coordinator) Karyn Pugliese (Editor-in-Chief)Guests: Richard Moon, Emily LaidlawBackground reading:The government doubles down on censoring the internet - The HubOnline harms bill could spark 'an absolute tsunami of complaints' - National PostCarson Jerema: Don't believe the Liberals, online harms act targets free speech - National PostThe history of Section 13, the controversial hate speech law the Liberals just revived - National PostPoilievre says online harms should be punished with jail, 'not pushed off to new bureaucracy' - National Post#198 Punching Nazis... With The Law! - CanadalandSponsors: Douglas, AG1If you value this podcast, Support us! You'll get premium access to all our shows ad free, including early releases and bonus content. You'll also get our exclusive newsletter, discounts on merch, tickets to our live and virtual events, and more than anything, you'll be a part of the solution to Canada's journalism crisis, you'll be keeping our work free and accessible to everybody. You can listen ad-free on Amazon Music—included with Prime. Hosted on Acast. See acast.com/privacy for more information.
Cybersecurity authority and former police officer Peter Taylor, also known as "The Fraud Guy," eliminates the noise around fraud by highlighting straightforward and impactful strategies for identifying money mules. Joined by Feedzai's Hardeep Rai, they unravel the distinctions between organized crime gangs and cybercrime gangs, delve into the perspectives of law enforcement agencies, and address a pivotal question in risk management: Are we at a turning point in the battle against fraud?
https://annvandersteel.comhttps://annvandersteel.substack.comhttps://RightNow.NewsHARD HITTING TRUTH AND PERSONAL IMPACT STORIES THAT MAKE A DIFFERENCESPECIAL GUEST:COL JOHN MILLS (RET)https://gettr.com/user/ColonelRETJohnhttps://substack.com/@colonelretjohnhttps://www.amazon.com/Against-Deep-State-John-Mills/dp/B0CK3H51Y2/ref=tmm_pap_swatch_0?_encoding=UTF8&qid=1694490414&sr=8-1SHOW DESCRIPTION:The war against the deep state is daily. From elections, to media, to health, military, surveillance, law, courts and Hollywood. The people continue to fight back, but against who? How do we win?Colonel Mills delivers significant experience in Department of Defense (DoD) and Department of Homeland Security (DHS) cybersecurity, technology, and critical infrastructure programs. He has worked extensively in train and equip efforts using Foreign Military Sales (FMS), foreign military financing, ITAR, and international military education and training, and builds public-private defense and technology industrial base partnerships, including helping establish the DoD's Development Innovation Unit (DIU) in Silicon Valley.Prior to joining The SPECTRUM Group (TSG), Colonel Mills served as the Director for Cybersecurity Policy, Strategy, and International Affairs in the Office of the Secretary of Defense. His work included creating and implementing the first DoD and intelligence community (IC) scorecarding initiative, boosting whole-of government cybersecurity and multidomain responses to threat actor and nation hostile actions.Colonel Mills' 33-year U.S. Army and Army Reserves career culminated in his serving as a senior liaison between DHS and DoD for complex homeland security operations. Earlier, he helped establish and advise foreign national military and security forces in Iraq, Afghanistan, Yemen, Bosnia, South Korea, and the Kingdom of Saudi Arabia. His roles spanned joint and inter-agency operations, psychological operations (PSYOP), intelligence activities, special operations, strategic planning, and public affairs.In addition to his work at TSG, Colonel Mills serves as an adjunct assistant professor for the Cybersecurity Law and Policy program at the University of Maryland, Global Campus.KEY WORDS: ANN VANDERSTEEL, JOHN MILLS, DEEP STATE, INTELLIGENCE COMMUNITY, JOHN BRENNAN, JAMES CLAPPER, SUEZ CANAL, BEN GURION, GOLD, BRICS, CCP, RUSSIA, IRAN, COMMUNISM, NATO, UKRAINE, RUSSIA, BRICS, GOLD, VENEZUELA, TACTICAL CIVICS, INSURRECTION, STOLEN ELECTION, TRUMP, BIDEN.WE ARE BEING INVADED. WILL YOU STAND AND DEFEND OUR REPUBLIC?PLEASE SUPPORT GiveSendGo.com/BurningEdgeOPERATION BURNING EDGE is a serious operation studying the negative impacts and downstream carnage caused by the Biden policies and illegal unconstitutional border migration forever changing the tapestry of America.Cartels are in control of the border running drugs, people and disease into America. Zoonotic disease are jumping from people to animals and back again leaving our cattle industry very vulnerable to slaughter as TB is making a comeback into humans and animals. The U.S. government is funding this invasion and aiding and abetting the trojan army being installed in America. You can support this work at GiveSendGo.com/BurningEdge.Stay tuned for daily updates weeknights on Brighteon TV at 8pm and Rumble and the rest at 9pm.Please consider supporting Operation Burning Edge: https://givesendgo.com/burningedgeFamed war correspondent, Michael Yon, and I are organizing a Southern border Expedition in Texas and Panama for the months of August/September. We have the top of the line gear and security for this entire trip filled with migrant encounters, helicopters, fixed wing aircraft, Law Enforcement, Customs and Border Patrol, Congressman and more who all want to learn from the intel gathering we will be doing in the field. Live reporting daily from the field with the latest on the invasion and who is behind it along with who is REALLY TRYING to stop it.HELP US COVER THE INVASION:- Top of the line Military Grade Communications, Gear, and Accommodations - Military Grade Communications Gear for ground-to-ground, ground-to-air, and satellite comms.- Starlink for broadband communications and broadcasting- Various sensors, including $500,000 cooled thermal camera attached to an $80,000 fifty-foot mast.- Image intensifiers, handheld thermal scanners, high quality low-light optics including the most modern optics platforms.- IR spotlights & detectors- Helicopter coverage- Multiple aviation options including helicopters and various fixed wing aircraft allowing for video capture and real-time thermal imaging.- Advanced drone technology with FAA certified Drone pilots.- Advanced audio and video equipment for discreet and overt audio/video capture - Multiple vehicles, RVs, and staff with military trained securityFollow Michael & Ann on Twitterhttps://twitter.com/Michael_Yonhttps://twitter.com/annvandersteelLIVE: BRIGHTEON.TV 8PM ETSPONSORED BY:MAKE HONEY GREAT AGAIN: https://MakeHoneyGreatAgain.comPROMO CODE: AVRICHARDSON NUTRITIONAL STORE – LAETRILLE / APRICOT SEEDS FOR HEALTHhttps://RNCStore.com PROMO CODE “AV”SATELLITE PHONE STOREhttps://sat123.comLIGHTS OUT BEEFhttps://LightsOutBeef.comC60 EVO -My health and beauty secret!https://www.c60evo.com/annvandersteel/ PROMO CODE “EVAV” 10%FOR RADIANT ENERGY & MENTAL FOCUS, INCREASED FLEXIBILITY, IMMUNITY & LONGEVITYàFOR PEOPLE & PETSALIAS IDhttps://AliasID.com PROMO CODE “AV”MY PILLOWhttps://MyPillow.com PROMO CODE “AV”EMF DEFENSEhttps://www.ftwproject.com/ref/470/STREAMING 8PM EThttps://RightNow.NewsSTREAMING 9PM ETCLOUTHUB https://clouthub.com/c/gyFG3mMSRUMBLE https://rumble.com/AnnVandersteel/liveGETTR https://gettr.com/user/annvandersteelFACEBOOK https://www.facebook.com/ann.vandersteelYOURNEWS https://yournews.com/area/videos/TWITTER https://twitter.com/annvandersteelEMAILRightNowAnn@protonmail.comSNAIL MAILAnn Vandersteel℅ P.O. BOX 386Palm City, Florida [34991]SPONSORS:https://lightsoutbeef.comhttps://AliasID.com Promo Code AVhttps://zstacklife.com Promo FOUNDATIONhttps://www.mypillow.com/ Promo AVhttps://www.ftwproject.com/ref/470/Transform the harmful wireless fields from; cell towers, smart meters, smartphones, internet router and your television, into more beneficial energy for you and your plants and petsBECOME A CITIZEN JOURNALISThttps://yournews.com/become-a-yournews-citizen-journalist/FOLLOW & SUBSCRIBE:https://AnnVandersteel.Substack.comhttps://twitter.com/annvandersteelhttps://truthsocial.com/@annvandersteelhttps://gettr.com/i/annvandersteelhttps://t.me/AnnVandersteelTruthhttps://annvandersteel.locals.comhttps://app.clouthub.com/#/users/u/AnnVandersteel/postshttps://gab.com/AnnVandersteelhttps://facebook.com/annvandersteelhttps://www.linkedin.com/in/ann-vandersteel-312310260/FAIR USE NOTICE These pages may contain copyrighted material the use of which has not been specifically authorized by the copyright owner. In accordance with Title 17 U.S.C. Section 107, such material has been referenced to advance understanding of political, human rights, ecological, economic, scientific, moral, ethical, and social justice issues. This constitutes a "fair use" of any such material as provided for in section 107 of the US Copyright Law.
Host Reed Galen is joined by Jeff Kosseff, Author and Associate Professor of Cybersecurity Law in the United States Naval Academy's Cyber Science Department. They discuss Jeff's latest book, Liar in a Crowded Theater: Freedom of Speech in a World of Misinformation, which examines and defends legal protections for false speech. You can pick up LIAR IN A CROWDED THEATER wherever fine books are found and for more from Reed Galen, be sure to subscribe to “The Home Front”. If you'd like to ask a question or share a comment with The Lincoln Project, send an email to podcast@lincolnproject.us. Learn more about your ad choices. Visit megaphone.fm/adchoices
EPISODE 1829: In this KEEN ON show, Andrew talks to Jeff Kosseff, author of LIAR IN A CROWDED THEATER, about the protection of free speech in our digital age of misinformationJeff Kosseff is an associate professor of cybersecurity law in the United States Naval Academy's Cyber Science Department. He is the author of four books and more than 20 academic journal articles. In fall 2023, Johns Hopkins University Press will publish his latest book, Liar in a Crowded Theater: Freedom of Speech in a World of Misinformation, which examines and defends legal protections for false speech. In 2019, he was named an Andrew Carnegie Fellow by the Carnegie Corporation of New York, to support his 2022 book The United States of Anonymous: How the First Amendment Shaped Online Speech. His 2019 book, The Twenty-Six Words That Created the Internet, traced the history of Section 230 of the Communications Decency Act. He also is the author of Cybersecurity Law, a textbook and treatise whose third edition was published by Wiley in 2022. Named as one of the "100 most connected men" by GQ magazine, Andrew Keen is amongst the world's best known broadcasters and commentators. In addition to presenting KEEN ON, he is the host of the long-running How To Fix Democracy show. He is also the author of four prescient books about digital technology: CULT OF THE AMATEUR, DIGITAL VERTIGO, THE INTERNET IS NOT THE ANSWER and HOW TO FIX THE FUTURE. Andrew lives in San Francisco, is married to Cassandra Knight, Google's VP of Litigation & Discovery, and has two grown children.
The First Amendment protects speech, but what kind? True speech, sure. But what about false or misleading speech? What if it's harmful? After all, you can't yell fire in a crowded theater—or can you?To answer these questions, Alan Rozenshtein, Associate Professor of Law at the University of Minnesota and Senior Editor at Lawfare spoke with Jeff Kosseff, who is an Associate Professor of Cybersecurity Law in the United States Naval Academy's Cyber Science Department and a Contributing Editor at Lawfare. Jeff is releasing his latest book this month, titled "Liar in a Crowded Theater: Freedom of Speech in a World of Misinformation," in which he describes, and defends, the First Amendment's robust protections for false and misleading speech.They spoke about the book, why you sometimes can yell fire in a crowded theater, and how new technology both superchargers misinformation and provides new tools to fight it.Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
Dyllan Brown-Bramble is a NY Biglaw privacy and cybersecurity associate and a Senior Fellow at the Internet Law and Policy Foundry. At his firm, Dyllan maintains an active pro bono practice with a focus on advising low-income entrepreneurs and small businesses. He also serves on the VOLS Pro Bono Advocates Council and the junior board for the Surveillance Technology Oversight Project. While in law school, he was a Tech Law & Policy Scholar, represented clients in the Intellectual Property and Information Policy Clinic, was a research assistant at the Center on Privacy & Technology, and was a teaching assistant for Computer Programming for Lawyers and Legal Communication Design. He also worked as a legal intern at Morgan Stanley and SambaTV and as a fellow at Mount Sinai Innovation Partners and InSITE. Internet Law & Policy Foundry VOLS Pro Bono Advocates Council Surveillance Technology Oversight Project Emily is available for coaching! Visit Beyondthelegallens.com
China's stance toward data privacy and cybersecurity has been a matter of interest for the last several years, most prominently with the June 2017 passage of China's Cybersecurity Law, and the passage of the Data Security Law and the Personal Information Protection Law in late 2021. Now, more than two years after the 2021 laws were passed, companies wishing to conduct business in this landscape are faced with a daunting set of subsidiary regulations that require self-assessments, impact assessments and certifications to ensure compliance, failure of which can attract potentially heavy fines and restrictions on business operations if circumvented. Join Mayer Brown partner Gabriela Kennedy and host Julian Dibbell as they revisit the China data laws and these latest developments and discuss the effect they've had on the industry, and what interested parties should be aware of in the coming years.
This episode explores the launch of the Federal Communications Commission (FCC) first-ever privacy and data protection task force, developed to address broader data privacy concerns. Scott Loughlin, co-lead of the Hogan Lovells Privacy and Cybersecurity practice, hosts a discussion with Hogan Lovells partner Katy Milner and senior counsel Charles Mathias regarding the creation of the task force and what this means for the future of privacy regulation and oversight in the telecommunications industry and beyond. Scott Loughlin: Contact Katy Milner: Contact Charles Mathias: Contact
Highlighting the increasingly prominent role of cybersecurity and informatization work in the new era, President Xi Jinping has stressed the need to coordinate development and security, with solid efforts to advance high-quality growth in this regard.Xi, who is also general secretary of the Communist Party of China Central Committee and chairman of the Central Military Commission, made the remarks in a recent instruction on the work of cybersecurity and informatization. The instruction was conveyed at a national meeting on cybersecurity and informatization that was held on Friday and Saturday in Beijing.Xi emphasized the importance of strengthening the country's capability to ensure the cybersecurity and promote building a community with a shared future in cyberspace.He also stressed adherence to several principles, including the Party exercising leadership over cyberspace affairs, developing of cyberspace affairs for the people, and taking a path of internet governance with Chinese characteristics.Calling for vigorous efforts to advance the high-quality development of cybersecurity and informatization, Xi said that new achievements should also be made in boosting China's strength in cyberspace, thus making new contributions to building a modern socialist country in all respects and advancing national rejuvenation on all fronts.The country's system and capacity for cybersecurity have constantly been improving, and its efforts to boost self-reliance and strength in science and technology have also been accelerated, while law-based governance of cyberspace has been intensified, Xi said.Wang Sixin, deputy head of Communication University of China's Institute for a Community with Shared Future, said, "The new requirements raised by Xi in this regard are essential and urgent."Summing up the work experience and clarifying current problems are crucial to future development in this field, as well as to benefiting the people and promoting the high-quality growth of our country."With the Party's leadership, China has seen many achievements in cyberspace governance since the 18th CPC National Congress in 2012. Its technological research, such as that on supercomputers and quantum communication, has been at the global forefront, while its artificial intelligence has been widely applied in many areas.Xi recalled the significant progress achieved in cybersecurity and informatization since the 18th CPC National Congress, noting that China has put in place a system for integrated cyberspace management, with the Party's leadership in such work having been strengthened across the board.As internet technologies, including 5G, big data, cloud computing and blockchain, have rapidly grown, the nation's legal toolkit on cybersecurity and informatization has become more complete through the formulation of a series of laws, such as the Cybersecurity Law, Data Security Law and Personal Information Protection Law.To offer a safer online environment for people, the Cyberspace Administration of China has also issued guidelines and taken measures to prevent online misconduct, such as cyberbullying and rumors, in order to guarantee the healthy development of the internet.All the moves have helped advance cybersecurity and informatization work, Wang said, adding that those measures contributed to enriching the country's theoretical building of cyberspace and improving the capacity of its cyberspace governance.Just like boosting the nation's self-reliance in science and technology, the theoretical construction in the field is vital to enhancing China's international voice, he said.Zhu Wei, deputy director of the Communication Law Research Center at China University of Political Science and Law, said that holding such a meeting to give new instructions on cybersecurity and informatization, following the 20th CPC National Congress in October, was inevitable and filled with profound meaning."When we're benefiting from the internet and solving problems on data, cybersecurity and informatization through laws, we must also acknowledge that we're still facing some challenges brought by emerging technologies," he said."We need to draw on some good practices from past work, as well as conduct new research to find solutions that can both develop the new technologies and meet the challenges."Expressing excitement about the acceleration of law-based governance in cyberspace in recent years, Zhu suggested that legislators and internet regulators continue upholding the principle of coordinating development and security in following lawmaking."The driving force of high-quality development is scientific and technological innovation, so in the coming period of time, the main task of formulating our policies and laws is to seek a balance between security and development," he said, adding that this is also a must to cope with the international situation.As development is a key to solving problems caused by technologies, a number of newly released regulations and laws have clarified that the country encourages technological research, requiring internet platforms to fight online misconduct through technical means.Since the beginning of this year, China has seen internet technologies prosper and also has accelerated steps in cyberspace governance.As ChatGPT takes the tech world by storm and triggers a new wave of artificial intelligence, a host of Chinese tech giants have begun rolling out ChatGPT-style products. Among them, Alibaba has invited enterprise users to test a self-developed large model called Tongyi Qianwen, and Baidu has unveiled its large language model and Chinese-language ChatGPT alternative, Ernie Bot, which could be implemented in a variety of functions including searches, autonomous driving and smart devices.To promote the healthy development of the technology, interim measures for managing generative AI services were jointly disclosed by seven authorities last week. The measures encourage the innovative development of generative AI and supervision of AI using methods compatible with innovation and development.Earlier, the country's top judicial authorities and top internet regulator also solicited public opinion on combating cyberbullying, in order to purify the online environment and protect people's legitimate rights in cyberspace.Zhou Hongyi, founder of 360 Security Group, said he was encouraged by Xi's instruction and felt more responsibility as head of a digital security enterprise."In the era of digital civilization, measures for guaranteeing traditional security are no longer able to meet new challenges, which requires us to strengthen scientific and technological creativity, so as to build a strong digital security barrier for the healthy growth of the digital economy," he said.As an enterprise that has been fighting on the front line of cyberattacks for years, 360 would like to continue being the guardian of national security, and also to be a builder of digital China, helping companies, governments and cities to address security weaknesses and become smarter, Zhou said.Reporter: Cao YinCui Jia contributed to this story.
China's law-based decision to ask its critical information infrastructure operators to stop buying products from Micron Technology is a necessary move to safeguard national security and is in line with international practices, officials and experts said on Monday.The move could reshape the nation's chip supply chains, bringing more opportunities to other competitive domestic and overseas memory chipmakers, they added.The comments came after the Cyberspace Administration of China said in a statement on Sunday that products of Micron, a United States-based global supplier of semiconductors, sold in China have not passed a recent cybersecurity review, and operators of the country's key information infrastructure should stop purchasing its products.Foreign Ministry spokeswoman Mao Ning said at a news conference on Monday that the decision is to prevent relevant products' cybersecurity risks from endangering China's critical information infrastructure."China is a country of the rule of law. … All enterprises in China should abide by Chinese law in their operations. Judicial authorities will investigate any suspected illegal activities in accordance with the law," Mao said."As long as enterprises, regardless of which country they are from, comply with Chinese laws and regulations, we welcome them and their products and services to enter the Chinese market. There is nothing to worry about," Mao added.The Cybersecurity Law outlines rules safeguarding critical information infrastructure — technology systems in sectors including telecommunications, transportation and defense — that Chinese regulators believe would be vulnerable if they malfunctioned or leaked data, experts said.Bai Ming, deputy director of international market research at the Chinese Academy of International Trade and Economic Cooperation, said the decision is in line with international practices in terms of placing greater emphasis on cybersecurity.Countries such as the US are also adopting increasingly tougher security reviews on electronic products concerning data, because data has become a key aspect of national security, Bai said.The move could profoundly affect Micron's business in China, a market accounting for around 11 percent of its $30.8 billion global sales in 2022, said Xiang Ligang, director-general of the Information Consumption Alliance, a telecom industry association."Chinese State-owned enterprises and their affiliates, at least, will stop buying Micron's products. And it could have a broader impact given the clear signal from the statement that Micron's products have cybersecurity risks," said a senior executive of a market research company, on condition of anonymity.Companies in the Chinese market have already started to avoid buying Micron's products since the government announced in March that the company was the subject of a cybersecurity review, the source added.Micron said in a statement on Monday that it had received notification of the review result and is assessing the next steps.Huatai Securities and CITIC Securities both said in research notes that the move will boost demand for the products of Chinese companies such as Yangtze Memory Technologies Corp and South Korean companies such as Samsung Electronics and SK Hynix.Micron is the world's third-largest maker of DRAM, or dynamic random access memory chips, which are flash memory chips widely used in smartphones, personal computers and servers.Micron accounted for 22.8 percent of the global DRAM market in 2021, behind Samsung's 43.6 percent and SK Hynix's 27.7 percent, according to market research company IC Insights.The Financial Times reported in April that Washington had urged South Korean officials to prevent its chipmakers from filling the market void if Micron was unable to sell its chips to China.Mao from the Foreign Ministry said on Monday that such moves by the US are aimed at safeguarding its own hegemonic interests."Coercing other countries to impose export restrictions on China seriously violates the principles of the market economy and international trade rules. … It is not in the interest of any party," Mao said.Wei Shaojun, a professor of integrated circuits at Tsinghua University, said the reported export restrictions would further accelerate the development of the domestic memory chip sector."China's semiconductor industry is on the rise, with an annual investment of nearly $30 billion," Wei said, adding that China is also the world's largest semiconductor market.Chip英/tʃɪp/ 美/tʃɪp/n.芯片Micron英/ˈmaɪkrɒn/ 美/ˈmaɪkrɑːn/n.美光
“Understand and know your data, and don't over-collect. If you're worried about it—and all businesses who collect data should worry about these laws—engage a privacy professional and attorney.” – Rebecca Rakoski Rebecca Rakoski, Esq., is the co-founder and managing partner of XPAN Law Partners. A boutique domestic and international cybersecurity and data privacy law firm, XPAN Law is dedicated to global strategic thinking that reduces risk and leads businesses forward. Rebecca, an experienced litigator, is committed to counseling and defending public and private corporations and their boards during data breaches and has handled hundreds of matters in state and federal courts. She is also skilled in mitigating her clients' litigation risks by managing the intersection of state, federal, and international regulations that impact the transfer, storage, and collection of data. She received her Juris Doctor from the Widener University School of Law. Rebecca joins us today to discuss data privacy and why it's critically important for small businesses to understand. She discusses the right to privacy and how the United States views it differently from other parts of the world. She explores state-level data privacy laws in the United States and describes how business practice should be done in states with data privacy laws. Rebecca also explains what access control policies are and why data privacy policies and practices need to evolve and be tailored to the needs of a business. This week on Breaking Barriers: What data privacy is and why it's important for small businesses to consider State-level privacy laws in the United States The importance of understanding the data you collect as a small business Why over-collecting and over-storing data should be avoided The first steps toward data privacy compliance The value of working with data privacy professionals and attorneys Access control policies and why data privacy policies and practices need to always evolve and change GDPR, data privacy, and personal data in the European Union Working with data privacy laws after a breach has occurred Resources Mentioned: Data Breach Investigations Report by Verizon Related Content: What Businesses Need To Know about Cybersecurity Law with Rebecca Rakoski of XPAN Law Partners Connect with Rebecca Rakoski: XPAN Law Partners XPAN Law Partners LLP on LinkedIn XPAN Law Partners LLP on Facebook XPAN Law Partners LLP on Twitter Rebecca Rakoski on LinkedIn Email: rrakoski@xpanlawpartners.com This podcast is brought to you by Hire Ground Hire Ground is a technology company whose mission is to bridge the wealth gap through access to procurement opportunities. Hire Ground is making the enterprise ecosystem more viable, profitable, and competitive by clearing the path for minority-led, women-led, LGBT-led, and veteran-led small businesses to contribute to the global economy as suppliers to enterprise organizations. For more information on getting started please visit us @ hireground.io today! If you enjoyed this episode, please subscribe and leave a review wherever you get your podcasts. Apple Podcasts | TuneIn | GooglePlay | Stitcher | Spotify Be sure to share your favorite episodes on social media and join us on Facebook, Twitter, and LinkedIn.
In the fast-paced, continually evolving landscape of privacy and cybersecurity, the need for legal and operational compliance remains constant. So how do you build a legal compliance program for your digital operations to keep pace with ever-changing law? One way is to focus on the fundamental principles related to privacy and cybersecurity. Here about these principles and more with special guest, Matti Neustadt who has a background as in-house counsel for some leading tech logos. She knows what it takes to be a privacy preacher and cybersecurity crusader while staying current and compliant. In short – she's the ideal guide to this new legal frontier.To learn more about cybersecurity services, visit:https://www.highwirenetworks.com/services/managed-cybersecurity/
Privacy and Cybersecurity laws are becoming increasingly relevant in other spaces of the law. (2/1/23) Come learn the basic laws and principles in this area, including: - Breach notification laws - Data security regulations - Basic cybersecurity principles - Unfair and deceptive acts and practices and their relationship to privacy - Personal Privacy statues like GDPR, CCPA/CPRA, and the new Connecticut Personal Data Privacy Act Questions? Inquiries about program materials? Contact Alan I. Johnson at ajohnson@bostonbar.org
Jared Coseglia is the Founder and CEO of TRU Staffing Partners, an award-winning staffing company representing talent and opportunities in data privacy, e-discovery, and cybersecurity. TRU has been voted a top-three legal and/or litigation support staffing agency for seven consecutive years in both the National Law Journal and the New York Law Journal and has been named one of the Inc. 5000 Fastest Growing Private Companies in America. Jared has placed over 3000 professionals in full-time and temporary positions at the Fortune 1000 and Am Law 200 levels and throughout the global consultancy, service, and software provider communities. As an active member of the legal and cybersecurity community, he is a member of the Board of Editors for Cybersecurity Law and Strategy, has written over 90 articles, regularly appears in podcasts and webinars, and has spoken at over 50 conferences. In this episode… When it comes to hiring, data privacy and security companies aren't sure what to look for in candidates. Similarly, professionals are struggling to understand businesses' qualifications and gain the skills needed for each discipline. With so much variability surrounding hiring practices, how can organizations maintain clarity to attract and retain top talent? Privacy and security staffing expert Jared Coseglia says that companies need to develop robust, transparent, and simple privacy and security programs. This demonstrates that you recognize your business' requirements and can assess the market effectively. Some companies have employed AI technology to streamline the hiring process. Yet, this raises representation issues, so Jared says it's crucial to utilize this technology to enhance diversity and provide candidates with an inclusive experience. In today's episode of She Said Privacy/He Said Security, Jodi and Justin Daniels chat with Jared Coseglia about hiring and staffing trends in privacy and security. Jared talks about how companies can attract and retain privacy talent, AI's role in the hiring process, and compensation in privacy versus security.
Colonel Mills delivers significant experience in Department of Defense (DoD) and Department of Homeland Security (DHS) cybersecurity, technology, and critical infrastructure programs. He has worked extensively in train and equip efforts using Foreign Military Sales (FMS), foreign military financing, ITAR, and international military education and training, and builds public-private defense and technology industrial base partnerships, including helping establish the DoD's Development Innovation Unit (DIU) in Silicon Valley. Prior to joining The SPECTRUM Group (TSG), Colonel Mills served as the Director for Cybersecurity Policy, Strategy, and International Affairs in the Office of the Secretary of Defense. His work included creating and implementing the first DoD and intelligence community (IC) scorecarding initiative, boosting whole-of government cybersecurity and multidomain responses to threat actor and nation hostile actions. Colonel Mills' 33-year U.S. Army and Army Reserves career culminated in his serving as a senior liaison between DHS and DoD for complex homeland security operations. Earlier, he helped establish and advise foreign national military and security forces in Iraq, Afghanistan, Yemen, Bosnia, South Korea, and the Kingdom of Saudi Arabia. His roles spanned joint and inter-agency operations, psychological operations (PSYOP), intelligence activities, special operations, strategic planning, and public affairs. In addition to his work at TSG, Colonel Mills serves as an adjunct assistant professor for the Cybersecurity Law and Policy program at the University of Maryland, Global Campus. You can purchase his book here: https://amzn.to/3W4FZIy
Last month the European Commission drafted a law called the Cyber Resilience Act. Its an extensive framework aimed at improving cybersecurity in the E-. For the implications on this side of the Atlantic, the Federal Drive turned to the senior policy analyst at the ITIF Center for Data Innovation, Kir Nuthi.
It may be a relatively easy connection to make - cybersecurity and privacy. But what about legal and operations and third-party products and services? Mix these things together, and some things get easier to understand ... yet some things get harder to manage.Cybersecurity lawyers are a growing need as those who implement controls often don't understand the laws. It is closely related to privacy law, so an ideal would be a cybersecurity and privacy lawyer. Join us as we explore this connection and the impact these roles (or combined role) can have on an organization.____________________________GuestK Royal, PhD, JDGlobal Privacy Officer at Outschool [@outschool]On Twitter | https://twitter.com/heartofprivacyOn LinkedIn | www.linkedin.com/in/kroyalSerious Privacy Podcast [@PodcastPrivacy] | https://seriousprivacy.buzzsprout.com/____________________________This Episode's SponsorsEdgescan | https://itspm.ag/itspegwebPentera | https://itspm.ag/pentera-tyuw____________________________ResourcesSOC2 reports explained: https://us.aicpa.org/interestareas/frc/assuranceadvisoryservices/aicpasoc2reportISO privacy and security article: https://www.iso.org/news/ref2419.htmlISO27001: https://www.iso.org/isoiec-27001-information-security.htmlISO27701: https://www.iso.org/standard/71670.htmlOther frameworks mentionedNIST privacy framework: https://www.nist.gov/privacy-frameworkCloud Security Alliance Cloud Controls Matrix: https://cloudsecurityalliance.org/research/cloud-controls-matrix/Inspiration for this episode | Cybersecurity or Privacy Woman Law Professional 2022: https://www.linkedin.com/posts/carmenmarsh_cybersecuritywomanoftheyear-cswy2022-womenincyber-activity-6952128839116369920-TxZU/____________________________To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-cybersecurity-podcastAre you interested in sponsoring an ITSPmagazine Channel?
Ep. 55 of the Cyber Law Revolution Podcast is live!Cybersecurity, data security, and privacy laws are the fast-moving and evolving regulations in the country. Don't blink, or you will miss an amendment or change existing law. The NYDFS demonstrated just that in a recent draft amendment to its already strict cybersecurity law. In this episode, we do a nerdy dive into the new proposed amendments.Feel free to call (410-917-5189), e-mail (spollock@mcdonaldhopkins.com), or comment below!
For decades, experts and analysts have written in great detail about the importance of liberalization and its role in promoting democracy and other western values. Specifically, many believed that once a state began this track towards liberalization, open markets and a liberal democracy was inevitable. Yet, the several decades following Henry Kissinger's secret trip to China has proven differently, as China continues to grow more distant and confrontational with the West. Lawfare Fellow in Cybersecurity Law, Alvaro Marañon, sat down with Aaron Friedberg, professor of politics and international affairs at Princeton University. Aaron is an expert on the relations between China and the West, and has written numerous articles and books assessing the economic, military and political dangers of this rivalry. They explored his new book, “Getting China Wrong”, and discussed the origins of the West's engagement with China, how and why the West miscalculated the Chinese Communist Party's identity and objectives, and how the U.S. and Biden administration can start getting China “right.”Support this show http://supporter.acast.com/lawfare. See acast.com/privacy for privacy and opt-out information.
Professor, Attorney and Expert in Cybersecurity Policy & Governance, Kevin Powers joins Jerich Beason & Whitney McCollum to discuss where the law stands on “Hacking Back”. Everyone at some point wants to be Batman. During this Cyberside Chat they will answer questions such as: Is it ok to do whatever it takes to protect data or is it like breaking back into a thief's house to steal your items back? What could go wrong? How does the Computer Fraud & Abuse Act apply? What are the civil and criminal ramifications to the company executives and board of directors? How do you advise as internal counsel or outside counsel on corporate vigilantism? Where should law and regulation go in regard to the ever-changing landscape of cyber threats? Kevin Powers also speaks about the need for legal professionals to learn cybersecurity law, the programs available, and how you can add CLE's on the subject.Articles & Links for Reference:https://www.justice.gov/jm/jm-9-48000-computer-fraudhttps://blog.malwarebytes.com/ransomware/2022/03/nvidia-the-ransomware-breach-with-some-plot-twists/https://www.wired.com/story/north-korea-hacker-internet-outage/Note: “The statements of the guest speakers and hosts in this podcast should not be construed as legal advice. They represent their views only and not those of Epiq or their respective employers.”BIOGRAPHYProfessor Kevin R. Powers, J.D., Founder and Director, Master of Science in Cybersecurity Policy and Governance Programs, Boston College Kevin is the founder and director of the Master of Science in Cybersecurity Policy and Governance Programs at Boston College, and an Assistant Professor of the Practice at Boston College Law School and in Boston College's Carroll School of Management's Business Law and Society Department. Along with his teaching at Boston College, Kevin is a Cybersecurity Research Affiliate at the MIT Sloan School of Management, and he has taught courses at the U.S. Naval Academy, where he was also the Deputy General Counsel to the Superintendent. With over 20 years of combined cybersecurity, data privacy, business, law enforcement, military, national security, higher education, and teaching experience, he has worked as an analyst and an attorney for the U.S. Department of Justice, U.S. Navy, U.S. Department of Defense, law firms in Boston and Washington, D.C., and as the general counsel for an international software company based in Seattle, Washington. Kevin also is an expert witness and consultant with the Analysis Group and serves as a Director for the Board of Reading Cooperative Bank, a Trustee for the Board of Boston College High School, an Advisory Board Member for HYCU, Inc. (Backed by Bain Capital Ventures) and CyberSaint Security, and as a Member of the Boston College Law School Business Advisory Council. From 2016-2017, he was the Panel Lead for the Collegiate Working Group for the U.S. Department of Homeland Security's National Initiative for Cybersecurity Education (NICE). Kevin, a Navy Veteran, regularly provides expert commentary regarding cybersecurity and national security concerns for varying local, national, and international media outlets.Find us on LinkedIn or email us at cyberside@epiqglobal.com.
This week on the podcast Bobby Chesney, James Baker Chair at the University of Texas School of Law, and co-founder of the awesome Lawfare.com blog and co-host of the National Security Law podcast, joins us for a discussion on all things cyber legal policy and regulations - and it is fun! We chat about the recent Viasat satellite hack that served dual-purposes for military application and disruption of industries (for example, impacting wind turbines!). He also shares perspective on cyber versus kinetic attacks, space wars, space law vs maritime law parallels and the geography of cyber. Want to learn more about cyber law and policy? Check out Chesney's free eCasebook on Cybersecurity Law, Policy, and Institutions here: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3547103 Bobby Chesney, James Baker Chair in Rule of Law and World Affairs at UT Austin Bobby Chesney holds the James Baker Chair and also serves as the Associate Dean for Academic Affairs at the University of Texas School of Law. In addition, he is the Director of the Robert S. Strauss Center for International Security and Law, a university-wide research unit bridging across disciplines to improve understanding of international security issues. Professor Chesney is a co-founder and contributor to www.lawfareblog.com, the leading source for analysis, commentary, and news relating to law and national security. He also co-hosts the National Security Law Podcast and contributes to the National Security Law Lectures series (which he co-founded with Matt Waxman). In 2021, Professor Chesney was appointed to the Cybersecurity Advisory Committee for the U.S. government's Cybersecurity and Infrastructure Security Agency. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e178
Scraping data from public websites is legal. That’s the upshot of a decision by the Ninth Circuit Court of Appeals earlier this week. LinkedIn had taken a case against data analytics company hiQ, arguing it was illegal for hiQ to “scrape” users’ profile data to analyze employee turnover rates under the federal Computer Fraud and Abuse Act (CFAA). Tiffany Li, a technology attorney and professor of law at the University of New Hampshire, joins our host Meghan McCarty Carino to talk about how the CFAA fits into today’s world.
Scraping data from public websites is legal. That’s the upshot of a decision by the Ninth Circuit Court of Appeals earlier this week. LinkedIn had taken a case against data analytics company hiQ, arguing it was illegal for hiQ to “scrape” users’ profile data to analyze employee turnover rates under the federal Computer Fraud and Abuse Act (CFAA). Tiffany Li, a technology attorney and professor of law at the University of New Hampshire, joins our host Meghan McCarty Carino to talk about how the CFAA fits into today’s world.
In this episode, A'ndre talks to Jeff Kosseff, Associate Professor of Cybersecurity Law at the US Naval Academy, about his forthcoming book, The United States of Anonymous: How the First Amendment Shaped Online Speech. Professor Kosseff discusses how the right to anonymity has shaped American values, politics, business, security, and discourse, particularly as technology has enabled people to separate their identities from their communications.
The extent to which lawyers, corporate executives, and government officials focus on cybersecurity fluctuates with the threat level posed by malicious cyber actors. In light of numerous ransomware attacks on critical industries, lawmakers are looking at more regulatory obligations to mitigate the risks these threats pose. Companies, meanwhile, are working to comply with a chaotic patchwork of rules and regulations. The field of cybersecurity law is not systematic, and industries are working through who owns the internal cyber regulatory responsibilities and compliance obligations. In an effort to create a coherent roadmap for everyone involved in cybersecurity law, https://cyber.fsi.stanford.edu/people/james-x-dempsey (Jim Dempsey) recently published a book titled https://iapp.org/store/books/a191P000003EzusQAC/ (Cybersecurity Law Fundamentals). On this episode of “Explain to Shane,” https://www.aei.org/profile/shane-tews/ (Shane) sits down with Jim to discuss his book, along with key lessons that lawmakers, industry leaders, and lawyers would be well-advised to consider when it comes to cyber.
In today's interconnected world, personal information has never been more broadly collected and analyzed by governments and corporations alike, making it imperative that we understand, enforce and update privacy laws in order to safeguard individual privacy. In this episode, WilmerHale podcast co-host and Partner John Walsh welcomes two national leaders in privacy law of all kinds: Partner Kirk Nahra and guest Stacey Gray. Nahra is the co-chair of WilmerHale's Big Data and Cybersecurity and Privacy Practices. Among his other accolades, he is the winner of the 2021 Vanguard Award from the International Association of Privacy Professionals (IAPP)—one of the most prestigious in the privacy field—which recognizes one IAPP member each year who demonstrates exceptional leadership, knowledge and creativity in privacy and data protection. Gray is a Senior Counsel at the Future of Privacy Forum (FPF) and leads FPF's engagement on federal and state privacy legislation. Prior to leading FPF's legislative engagement, she spent several years focusing on the privacy implication of data collection in online and mobile advertising, platform regulation, cross-device tracking, Smart Homes, and the Internet of Things. Nahra and Gray talk with Walsh about the challenges of having states with different privacy laws and why that may ultimately drive a single national law. They also dive into consumer consent and the complexities of regulating the collection and sharing of personal data. The episode wraps up with tips for individuals and companies to keep in mind when considering privacy and personal data. Links: https://gdpr.eu/what-is-gdpr/ (General Data Protection Regulation (GDPR)) California Consumer Privacy Act (CCPA) https://fpf.org/ (Future of Privacy Forum) https://fpf.org/person/stacey-gray/ (Stacey Gray's bio) https://www.wilmerhale.com/en/insights/blogs/wilmerhale-privacy-and-cybersecurity-law (WilmerHale's Privacy and Cybersecurity Law blog) https://www.wilmerhale.com/en/people/kirk-nahra (Kirk Nahra's bio)